초록

Antagonistic network traffic is frequently"diverse” from kind traffic in ways that can beclassified without knowing the way of the attack.Anomaly exposure is a significant problem thathas been investigates within diverse research areasand application domains. Many anomaly exposuretechniques have been specifically residential forcertain application domains, while others are moregeneric. These survey papers provide a orderedand complete overview of the research on anomalyexposure. We have grouped existing techniquesinto different categories based on the underlyingapproach adopted by each technique. For eachgroup we have recognized key assumptions, whichare used by the method to distinguish betweennormal and anomalous behavior.For each category, we discuss a basic anomalyexposure technique, and then show how thedifferent accessible techniques in that group arevariants of the basic technique. Here our paperfocus on anomaly exposure in network and itsimpact over the network and classify the differenttechnique for detecting anomaly in network.